Search Result
Save to File
Your search for
38165
returns
3500
document(s)
A comparative analysis of HC-128 and rabbit encryption schemes for pervasive computing in WSN environment, (LNCS-Lecture Notes in Computer Science 5576) Hal 682-691
Author: Firdous Kausar; Ayesha Naureen; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar
|
Add To Favorites
|
Detail in New Window
A comparative analysis of PKC and semi-PKC based key management schemes for hierarchical sensor networks, (LNCS-Lecture Notes in Computer Science 5576) Hal 692-701
Author: Ayesha Naureen; Attiya Akram; Rabia Riaz; Ki-Hyung Kim; H. Farooq Ahmed; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar
|
Add To Favorites
|
Detail in New Window
Aggregate and verifiably encrypted signatures from multilinear maps without random oracles, (LNCS-Lecture Notes in Computer Science 5576) Hal 750-759
Author: Markus Ruckert; Dominique Schroder; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar
|
Add To Favorites
|
Detail in New Window
Domain specifict intented use evaluation method: intrusion detection spesific intented use evaluation method, (LNCS-Lecture Notes in Computer Science 5576) Hal 778-787
Author: Albert Park; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar
|
Add To Favorites
|
Detail in New Window
Cryptanalysis of secure key exchange protocol between STB and smart card in IPTV broadcasting, (LNCS-Lecture Notes in Computer Science 5576) Hal 797-803
Author: Song-Hee Lee; Nam-Sup Park; Soo Kyun Kim; Jin-Young Choi; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar
|
Add To Favorites
|
Detail in New Window
Selecting the wireless communication methods for establishing ubiquitous city-gas facilities in Korea, (LNCS-Lecture Notes in Computer Science 5576) Hal 823-828
Author: Jeong Seok Oh; Jang Sik Park; Jeong Rock Kwon; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar
|
Add To Favorites
|
Detail in New Window
Safety high accuracy context-aware matrix (CAM) making based on X.509 proxy certificate, (LNCS-Lecture Notes in Computer Science 5576)Hal 829-837
Author: Hoon Ko; Ning Chen; Goreti Marreiros; Carlos Ramos; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar
|
Add To Favorites
|
Detail in New Window
optimiza acces of hosting services to support students organiza tion activity (case study applied science dapartement of telkom university ( hal 8 )
Author: Prajna deshanta ibnugraha, Marlindia ike sari; | Call Number: SEM-361 | Type: Indeks Artikel prosiding/Sem
Find Similar
|
Add To Favorites
|
Detail in New Window
A Conceptual Study Of Data Governance For Food Security
Author: Dewi Puspasari; | Call Number: TR-CSUI/018 (015-020)2019 | Type: Technical Report
Find Similar
|
Add To Favorites
|
Detail in New Window
Computer security : art and science
Author: Bishop, Matt; | Call Number: 005.8 Bis c | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Prev
9
10
11
12
13
14
15
16
17
18
Next